mirror of
https://github.com/decalage2/awesome-security-hardening.git
synced 2025-01-24 14:21:12 -05:00
added Tools/SSH and ssh-audit
This commit is contained in:
parent
109c324a5e
commit
6903b86859
@ -50,6 +50,7 @@ This is work in progress: please contribute by sending your suggestions. You may
|
||||
- [GNU/Linux](#gnulinux-1)
|
||||
- [Network Devices](#network-devices-1)
|
||||
- [TLS/SSL](#tlsssl-1)
|
||||
- [SSH](#ssh-1)
|
||||
- [Docker](#docker)
|
||||
- [Tools to apply security hardening](#tools-to-apply-security-hardening)
|
||||
- [GNU/Linux](#gnulinux-2)
|
||||
@ -290,6 +291,10 @@ See also [Active Directory](#active-directory) and [ADFS](#adfs) below.
|
||||
|
||||
- [Qualys SSL Labs - List of tools to assess TLS/SSL servers and clients](https://github.com/ssllabs/research/wiki/Assessment-Tools)
|
||||
|
||||
### SSH
|
||||
|
||||
- [ssh-audit](https://github.com/arthepsy/ssh-audit) - SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
|
||||
|
||||
### Docker
|
||||
|
||||
- [Docker Bench for Security](https://github.com/docker/docker-bench-security) - script that checks for dozens of common best-practices around deploying Docker containers in production, inspired by the CIS Docker Community Edition Benchmark v1.1.0.
|
||||
|
Loading…
Reference in New Issue
Block a user